AbstractRecent research has repeatedly shown that machine learning techniques can be applied to either whole files or file fragments to classify them for analysis. We build upon these techniques to show that for samples of un-labeled compiled computer object code, one can apply the same type of analysis to classify important aspects of the code, such as its target architecture and endianess. We show that using simple byte-value histograms we retain enough information about the opcodes within a sample to classify the target architecture with high accuracy, and then discuss heuristic-based features that exploit information within the operands to determine endianess. We introduce a dataset with over 16000 code samples from 20 architectures and...
Human-in-the-loop interfaces for machine learning provide a promising way to reduce the annotation e...
Malware is a serious threat in a world where IoT devices are becoming more and more pervasive; indee...
The explosive growth of software systems with both size and complexity results in the recognised nee...
AbstractRecent research has repeatedly shown that machine learning techniques can be applied to eith...
Classification Computer architecture Malware analysis Object code a b s t r a c t Recent research ha...
This thesis explores how architecture and endianness of executable code can be identified using bina...
Static and dynamic binary analysis techniques are actively used to reverse engineer software's behav...
The research project, Feature Extraction and, Analysis of Binaries for Classification, provides an i...
This thesis examines the application of document classification techniques to collections of source ...
In this article we use machine activity metrics to automatically distinguish between malicious and t...
Different software tools, such as decompilers, code quality analyzers, recognizers of packed executa...
This thesis concerns the problem of object detection, which is defined as finding all instances of a...
Becoming increasingly complex, software development relies heavily on the reuse of existing librarie...
Thousands of new malware codes are developed every day. Signature-based methods, which are employed ...
A code smell is a surface indication that usually corresponds to a deeper problem in the system. De...
Human-in-the-loop interfaces for machine learning provide a promising way to reduce the annotation e...
Malware is a serious threat in a world where IoT devices are becoming more and more pervasive; indee...
The explosive growth of software systems with both size and complexity results in the recognised nee...
AbstractRecent research has repeatedly shown that machine learning techniques can be applied to eith...
Classification Computer architecture Malware analysis Object code a b s t r a c t Recent research ha...
This thesis explores how architecture and endianness of executable code can be identified using bina...
Static and dynamic binary analysis techniques are actively used to reverse engineer software's behav...
The research project, Feature Extraction and, Analysis of Binaries for Classification, provides an i...
This thesis examines the application of document classification techniques to collections of source ...
In this article we use machine activity metrics to automatically distinguish between malicious and t...
Different software tools, such as decompilers, code quality analyzers, recognizers of packed executa...
This thesis concerns the problem of object detection, which is defined as finding all instances of a...
Becoming increasingly complex, software development relies heavily on the reuse of existing librarie...
Thousands of new malware codes are developed every day. Signature-based methods, which are employed ...
A code smell is a surface indication that usually corresponds to a deeper problem in the system. De...
Human-in-the-loop interfaces for machine learning provide a promising way to reduce the annotation e...
Malware is a serious threat in a world where IoT devices are becoming more and more pervasive; indee...
The explosive growth of software systems with both size and complexity results in the recognised nee...